ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login
Archived Papers for Journal

International Journal of Computer Engineering and Technology (IJCET) >>

Vol.9, No.6

Publisher: IAEME Publication

Publishing Date: 2018-12-28

  1. COST SENSITIVE SOFTWARE DEFECT PREDICTION TECHNIQUE USING GENETIC ALGORITHM

    Authors: G N V RAMANA RAO VVSSS BALARAM; DR.B.VISHNUVARDHAN

  2. STRATEGY DEVELOPMENT BASED SECURITY APPLICATION TO BOOST THE SOFTWARE SECURITY DEFINED NETWORK USING MODERN PROFICIENT HILL CIPHER ALGORITHM

    Authors: S.K. MURUGANANDHAM S. NALLUSAMY DULAL KRISHNA MANDAL; PARTHA SARATHI CHAKRABORTY

  3. COURSE EVALUATION OF AN INSTITUTION USING EDM

    Authors: S. JOTHI LAKSHMI; M. THANGARAJ

  4. BANANA-SEG, A FULLY CONVOLUTIONAL DEEP NEURAL NETWORK FOR BANANA TREE CROWN MAPPING IN AERIAL IMAGERY ACQUIRED FROM AN UNMANNED AERIAL VEHICLE (UAV)

    Authors: RAMESH KESTUR; MEENAVATHI M.B

  5. SAT BASED ALGORITHMIC APPROACH FOR SUDOKU PUZZLE

    Authors: DEEPIKA RAI N.S. CHAUDHARI; MAYA INGLE

  6. A GENETIC ALGORITHM BASED APPROACH TO SOLVE VLSI FLOORPLANNING PROBLEM

    Authors: LEENA JAIN; AMARBIR SINGH

  7. A SURVEY ON SECURITY ATTACKS AND CHALLENGES IN BITCOIN

    Authors: VIJI PRIYA .G KRISHNA PRIYA .G VIVEK .M; ASHWINI .R

  8. DATA SECURITY ON CLOUD COMPUTING

    Authors: AZHAR USHMANI

  9. DATA SECURITY ON CLOUD COMPUTING

    Authors: AZHAR USHMANI

  10. SCIENTIFIC WORKFLOW SCHEDULING IN CLOUD COMPUTING ENVIRONMENT: A SURVEY

    Authors: A. THUSHARA

  11. OPINION MINING FROM CUSTOMER REVIEWS FOR EFFECTIVE EVENT MANAGEMENT

    Authors: MITA K. DALAL

  12. MAINTAINABILITY EVALUATION MODEL FOR OBJECT ORIENTED SOFTWARE

    Authors: NIDHI GOYAL; REENA SRIVASTAVA

  13. FUZZY ASSOCIATION RULE MINING FOR STUDENT PERFORMANCE EVALUATION

    Authors: Sweta V. Parmar; LokeshKumar Sharma

  14. AN AVANT-GARDE APPROACH OF BLOCKCHAIN IN BIG DATA ANALYTICS

    Authors: Manisha Valera Parth Patel; Shruti Chettiar

  15. EDPFRS: ENHANCED DYNAMIC POPULAR FILE REPLICATION AND SCHEDULING FOR DATA GRID ENVIRONMENT

    Authors: Bhuvaneswari R; Ravi T N EDPFRS

  16. AN EFFICIENT APPROACH FOR PROVIDING FULL CONNECTIVITY IN WIRELESS SENSOR NETWORK

    Authors: Shobha Biradar; Mallikarjuna Shastry P.M

  17. SMART GARBAGE BIN SYSTEM

    Authors: Revathi Lavanya Baggam

  18. COMPARAITIVE ANATYSIS OF FACIAL EXPRESSION RECOGNITION USING HMM AND SVM

    Authors: Devang Pandya Vandana Patidar; Divya Kushwah

  19. GENETIC SYNDROME DETECTION USING RADON TRANSFORM AND BIT PLANES

    Authors: Archana P. Ekbote; Varsha R. Ratnaparkhe

  20. MODERN IRRIGATION SYSTEM

    Authors: Varshali Jaiswal Krati Mahalwar Shalivahan Singh; Shray Khandelwal

  21. SAT BASED ALGORITHMICAPPROACH FOR SUDOKU PUZZLE

    Authors: Deepika Rai N.S. Chaudhari; Maya Ingle

  22. APPLYING VIGOR AND PARTICLE SKIN ON THREE DIMENSIONAL PERSON VISAGE TERMINOLOGY

    Authors: Arun Kumar S

  23. HYBRID AUCTION-BASED MECHANISM FOR DYNAMIC VIRTUAL MACHINE PROVISIONING AND ALLOCATION IN CLOUD

    Authors: Wasim Raja A

  24. IDENTIFICATION APPROACH FOR BIOMETRIC SYSTEMS USING THE ABM PROCEDURE WITH THE LOW FREQUENCY EYE TRACKER

    Authors: Shanthi

  25. PRESERVING DATA AND MANAGING CONCURRENCY IN DISTRIBUTED DATABASE

    Authors: Karthick S

  26. A STUDY ON NETWORK SECURITY PARADIGM IN 21ST ERA

    Authors: A. Umamaheswari R. Loganathan

  27. EXEMPLIFYING DIGITAL IMAGE PROCESSING USING EXPERIMENTS

    Authors: N. Viswanathan K. Manivel